mirror of
https://github.com/Vyntral/god-eye.git
synced 2026-05-16 21:43:34 +02:00
3a4c230aa7
Complete architectural overhaul. Replaces the v0.1 monolithic scanner with an event-driven pipeline of auto-registered modules. Foundation (internal/): - eventbus: typed pub/sub, 20 event types, race-safe, drop counter - module: registry with phase-based selection - store: thread-safe host store with per-host locks + deep-copy reads - pipeline: coordinator with phase barriers + panic recovery - config: 5 scan profiles + 3 AI tiers + YAML loader + auto-discovery Modules (26 auto-registered across 6 phases): - Discovery: passive (26 sources), bruteforce, recursive, AXFR, GitHub dorks, CT streaming, permutation, reverse DNS, vhost, ASN, supply chain (npm + PyPI) - Enrichment: HTTP probe + tech fingerprint + TLS appliance ID, ports - Analysis: security checks, takeover (110+ sigs), cloud, JavaScript, GraphQL, JWT, headers (OWASP), HTTP smuggling, AI cascade, Nuclei - Reporting: TXT/JSON/CSV writer + AI scan brief AI layer (internal/ai/ + internal/modules/ai/): - Three profiles: lean (16 GB), balanced (32 GB MoE), heavy (64 GB) - Six event-driven handlers: CVE, JS file, HTTP response, secret filter, multi-agent vuln enrichment, anomaly + executive report - Content-hash cache dedups Ollama calls across hosts - Auto-pull of missing models via /api/pull with streaming progress - End-of-scan AI SCAN BRIEF in terminal with top chains + next actions Nuclei compat layer (internal/nucleitpl/): - Executes ~13k community templates (HTTP subset) - Auto-download of nuclei-templates ZIP to ~/.god-eye/nuclei-templates - Scope filter rejects off-host templates (eliminates OSINT FPs) Operations: - Interactive wizard (internal/wizard/) — zero-flag launch - LivePrinter (internal/tui/) — colorized event stream - Diff engine + scheduler (internal/diff, internal/scheduler) for continuous ASM monitoring with webhook alerts - Proxy support (internal/proxyconf/): http / https / socks5 / socks5h + basic auth Fixes #1 — native SOCKS5 / Tor compatibility via --proxy flag. 185 unit tests across 15 packages, all race-detector clean.
80 lines
2.1 KiB
Go
80 lines
2.1 KiB
Go
// Package vhost is a Fase 0.6 adapter around v1 network.VHostScanner which
|
|
// performs virtual host discovery on resolved IPs. Reveals additional
|
|
// hostnames sharing infrastructure with in-scope targets.
|
|
package vhost
|
|
|
|
import (
|
|
"strings"
|
|
"sync"
|
|
"time"
|
|
|
|
"god-eye/internal/eventbus"
|
|
"god-eye/internal/module"
|
|
"god-eye/internal/network"
|
|
"god-eye/internal/store"
|
|
)
|
|
|
|
const ModuleName = "discovery.vhost"
|
|
|
|
type vhostModule struct{}
|
|
|
|
func Register() { module.Register(&vhostModule{}) }
|
|
|
|
func (*vhostModule) Name() string { return ModuleName }
|
|
func (*vhostModule) Phase() module.Phase { return module.PhaseResolution }
|
|
func (*vhostModule) Consumes() []eventbus.EventType { return []eventbus.EventType{eventbus.EventDNSResolved} }
|
|
func (*vhostModule) Produces() []eventbus.EventType {
|
|
return []eventbus.EventType{eventbus.EventSubdomainDiscovered}
|
|
}
|
|
func (*vhostModule) DefaultEnabled() bool { return false } // opt-in
|
|
|
|
func (*vhostModule) Run(mctx module.Context) error {
|
|
if !mctx.Config.Bool("vhost_scan", false) {
|
|
return nil
|
|
}
|
|
timeout := mctx.Config.Int("timeout", 10)
|
|
target := mctx.Target
|
|
|
|
hosts := mctx.Store.All(mctx.Ctx)
|
|
seenIP := make(map[string]struct{})
|
|
for _, h := range hosts {
|
|
for _, ip := range h.IPs {
|
|
seenIP[ip] = struct{}{}
|
|
}
|
|
}
|
|
|
|
scanner := network.NewVHostScanner(timeout)
|
|
var wg sync.WaitGroup
|
|
for ip := range seenIP {
|
|
ip := ip
|
|
if mctx.Ctx.Err() != nil {
|
|
break
|
|
}
|
|
wg.Add(1)
|
|
go func() {
|
|
defer wg.Done()
|
|
res := scanner.DiscoverVHosts(mctx.Ctx, ip)
|
|
if res == nil {
|
|
return
|
|
}
|
|
for _, h := range res.Domains {
|
|
h = strings.ToLower(strings.TrimSpace(h))
|
|
if h == "" || !strings.HasSuffix(h, target) {
|
|
continue
|
|
}
|
|
_ = mctx.Store.Upsert(mctx.Ctx, h, func(sh *store.Host) {
|
|
store.AddIPs(sh, []string{ip})
|
|
store.AddDiscoveryMethod(sh, "vhost")
|
|
})
|
|
mctx.Bus.Publish(mctx.Ctx, eventbus.SubdomainDiscovered{
|
|
EventMeta: eventbus.EventMeta{At: time.Now(), Source: ModuleName, Target: h},
|
|
Subdomain: h,
|
|
Method: "vhost",
|
|
})
|
|
}
|
|
}()
|
|
}
|
|
wg.Wait()
|
|
return nil
|
|
}
|